Sfoglia per Autore  GALANTUCCI, STEFANO

Opzioni
Mostrati risultati da 1 a 11 di 11
Titolo Data di pubblicazione Autore(i) File
One Time User Key: a user-based secret sharing XOR-ed model for multiple user cryptography in distributed systems 1-gen-2021 Galantucci, S.; Impedovo, D.; Pirlo, G.
A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19 Pandemic 1-gen-2021 Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.
Ensemble consensus: An unsupervised algorithm for anomaly detection in network security data 1-gen-2021 Dentamaro, V.; Convertini, V. N.; Galantucci, S.; Giglio, P.; Palmisano, T.; Pirlo, G.
A novel genetic algorithm approach for firewall policy optimization 1-gen-2022 Coscia, A.; Dentamaro, V.; Galantucci, S.; Impedovo, D.; Maci, A.
Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study 1-gen-2022 Cannarile, Angelo; Dentamaro, Vincenzo; Galantucci, Stefano; Iannacone, Andrea; Impedovo, Donato; Pirlo, Giuseppe
Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection 1-gen-2022 Carrera, Francesco; Dentamaro, Vincenzo; Galantucci, Stefano; Iannacone, Andrea; Impedovo, Donato; Pirlo, Giuseppe
A study on malware detection and classification using the analysis of API calls sequences through shallow learning and recurrent neural networks 1-gen-2022 Cannarile, A.; Carrera, F.; Galantucci, S.; Iannacone, A.; Pirlo, G.
YAMME: a YAra-byte-signatures Metamorphic Mutation Engine 1-gen-2023 Coscia, A; Dentamaro, V; Galantucci, S; Maci, A; Pirlo, G
An innovative two-stage algorithm to optimize Firewall rule ordering 1-gen-2023 Coscia, A.; Dentamaro, V.; Galantucci, S.; Maci, A.; Pirlo, G.
A Heuristic to Select the Optimal Transformation Matrixes in Bioconvolving with Mixing Transform 1-gen-2023 Castro, F.; Galantucci, S.; Impedovo, D.; Pirlo, G.
Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks 1-gen-2024 Coscia, A.; Dentamaro, V.; Galantucci, S.; Maci, A.; Pirlo, G.
Mostrati risultati da 1 a 11 di 11
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile